Apple's iOS 14.8 Update Fixes Zero-Click Exploit Used to Distribute Pegasus Spyware - MacRumors
Skip to Content

Apple's iOS 14.8 Update Fixes Zero-Click Exploit Used to Distribute Pegasus Spyware

Today's iOS 14.8 update addresses a critical vulnerability that Apple engineers have been working around the clock to fix, reports The New York Times.

nso israeli surveillance firm
Last week, The Citizen Lab informed Apple about a new zero-click iMessage exploit targeting Apple's image rendering library. Called FORCEDENTRY, the exploit could infect an iPhone, iPad, Apple Watch, or Mac with the Pegasus spyware, providing access to the camera and microphone in addition to allowing access to text messages, phone calls, and emails.

FORCEDENTRY was distributed by Israel's NSO Group to governments and various other entities, and The Citizen Lab discovered it after analyzing the iPhone of a Saudi activist. Details were sent to Apple on September 7, and Apple took a week to fix the bug. According to The Citizen Lab, FORCEDENTRY has been in use since at least February 2021.

"This spyware can do everything an iPhone user can do on their device and more," said Citizen Lab senior researcher John-Scott Railton.

Apple lists the fix as CVE-2021-30860, and described it as a maliciously crafted PDF that could lead to arbitrary code execution.

Back in July, a slew of media reports highlighted zero-click iMessage exploits called Pegasus, which were distributed by Israeli surveillance firm NSO Group and were used to target journalists, lawyers, and human rights activists around the world. A database of more than 50,000 people who had been targeted by NSO's clients was made public at the time.

The Pegasus spyware is notable because it skirts BlastDoor, specific iMessage protections that Apple put into place in with the launch of iOS 14. BlastDoor is a sandbox security system for Messages that's designed to prevent exploits like Pegasus, but it's still a work in progress.

Apple told The New York Times that it plans to add spyware barriers to the iOS 15 software update to prevent similar attacks in the future.

Note: Due to the political or social nature of the discussion regarding this topic, the discussion thread is located in our Political News forum. All forum members and site visitors are welcome to read and follow the thread, but posting is limited to forum members with at least 100 posts.

Popular Stories

macOS 26 and Terminal Feature

macOS 26.4 Introduces New Security Feature for Terminal Commands

Wednesday March 25, 2026 1:24 pm PDT by
macOS Tahoe 26.4 introduces a new security feature that warns Mac users if they paste certain commands in the Terminal app that may be harmful. For those unaware, the Terminal app allows you to enter text commands to perform tasks on your Mac. Terminal is primarily intended for advanced users and developers, but unfortunately casual users can be tricked into entering harmful commands that...
lock screen notifications for iPhones running out of date versions of iOS feature 3

Apple Now Sending Critical Security Alerts to iPhones Running iOS 17 and Earlier

Friday March 27, 2026 7:21 am PDT by
Apple has begun pushing Lock Screen notifications to iPhones and iPads running older versions of iOS and iPadOS, warning users of active web-based attacks. The alerts, which appear as a "Critical Software" notification from the Settings app, warn that Apple "is aware of attacks targeting out-of-date iOS software, including the version on your iPhone," and urge users to install a critical...
apple lock security bug vulnerability fix privacy

Apple Says No iPhone in Lockdown Mode Has Ever Been Hacked

Friday March 27, 2026 9:33 am PDT by
Apple says it has no record of a successful spyware attack against any device running Lockdown Mode, the opt-in security feature it introduced in 2022. "We are not aware of any successful mercenary spyware attacks against a Lockdown Mode-enabled Apple device," an Apple spokesperson told TechCrunch. Lockdown Mode is available on the iPhone, iPad, and Mac, and dramatically restricts...

Top Rated Comments

60 months ago

Just turn this off!


And for even more security...



Attachment Image
Score: 41 Votes (Like | Disagree)
Mantahoe Avatar
60 months ago

Just turn this off!


This is dumb. Regular sms is worse security-wise.
Score: 32 Votes (Like | Disagree)
60 months ago

Why did apple not start on this back in July?
Because they didn't know about this particular exploit back in July. The article makes that pretty clear.
Score: 16 Votes (Like | Disagree)
Benjamin Nabulsi Avatar
60 months ago
Why Apple, Google, and Microsoft don't sue such companies and run their resources to the ground?
Score: 16 Votes (Like | Disagree)
60 months ago
Well this is great News!
Score: 16 Votes (Like | Disagree)
mw360 Avatar
60 months ago

Why did apple not start on this back in July?
There are a series of clues in all those words underneath the picture.
Score: 15 Votes (Like | Disagree)